Introduction Lets get started at an apparently unrelated point. Lets assume we create a table in SQL. Now there are three main parts of a database management system, like SQL. They are – Creating structure of table Entering data Making queries (and getting meaningful results from data) Now, when SQL …
Read More »Bosch Security Systems – XML Injection
# Exploit Title: Bosch Security Systems – XML Injection – Dinion NBN-498 Web Interface # Date: 01/09/2015 # Exploit Author: neom22 # Vendor Homepage: http://us.boschsecurity.com # Data Sheet: http://resource.boschsecurity.us/documents/Data_sheet_enUS_9007201286798987.pdf # Version: Hardware Firmware 4.54.0026 – Web Interface version is unknown # Tested on: Windows 8.1 – Firefox 40.0.3 # CVE …
Read More »
GPGLABS : Cyber Security, Internet Security, Tips GPGLABS : Information Security, Hacking News, Cyber Security, Network Security with in-depth technical coverage of issues and events